Neither courteous nor honest

palm

“I loved your show.”

Bob and I both had our mouths full of Roquefort and pears and sourdough croutons. We raced each other to swallow awkwardly in order to answer. The man stood at our table expectantly and watched us chew. One of us finally managed a polite reply.

“You’re really good at reading people,” the man continued, and went on, full of praise and compliments. He was referring to a routine in our show in which Bob analyzes the personalities of five or six audience members. It had gone especially well that night and the man was raving about it. Bob and I set our knives and forks down and smiled up at him while he recalled “a similar show” in which a woman’s brassiere was ripped off.

We detest the comparison to this goofy magician’s coup, but we nodded and smiled some more. Our courtesy encouraged him. He gestured with enthusiasm, sloshing a bit of red wine onto the table. I folded my hands in my lap and realized the bouillabaisse would arrive before we finished our first course.

The man was now relating how he was almost pickpocketed once, long ago. Oh, you’ll like this story, he promised, and asked permission to sit down. Sure, we had to say, but my smile was thin. The man launched into his ancient near-catastrophe. Just as he was getting to the good part, how he foiled the theft before it ever happened, his wife arrived at our table, wine in hand.

“Oh, he hasn’t imposed himself, I hope,” she said. “Shelly, why are you sitting at their table? They’re trying to have a nice dinner.”

“I’m not bothering them, we’re having good conversation!” he said jovially. “They look conservative but I bet they like to get wild! We can join you, if you like,” he suggested. “I’m sure the waiter wouldn’t mind moving our plates! And a bottle of wine, please!” He gestured to a hovering waiter.

“Of course we won’t do that, Sheldon! Get up right now and let’s leave these people alone.” The woman turned to me. “I’m very sorry, he must be a little drunk.”

“Not at all! Sit down, Phyll. I’ll tell the waiter.” The man rose.

“Shelly, don’t be rude. You can’t just—”

“You’re welcome to sit,” I finally said, “just please don’t stand over us arguing.”

That was all it took. The couple’s cold, half-eaten meal was quickly brought to our table and Bob and I picked up our silverware. At least we didn’t have to say much. The man was full of stories and his wife supplied timely prods. Bob made appropriate replies, dredging up authentic courtesy from some stale reserve. My well was dry.

The bouillabaisse arrived steaming; its clear broth, fragrant with fennel, covered barely-cooked fish. I had the distinct impression that the couple had designed their finagle from the start, despite their bickering role-play. The way the wife sauntered over with her lipsticky wine glass, like a suburban housewife ready for twilight gossip. Why, otherwise, were their plates brought over so readily? And the bottle of wine. They must have cued the waiters. I took another sniff of soup scent and lifted my spoon.

“I know!” the man said looking at me. “Let me read your hand. You’ll love this.”

A palm reader in Yokohama's Chinatown
A palm reader in Yokohama's Chinatown

“He’s really good at it,” his wife said. Silver charms on her necklace flashed as she leaned back anticipating our satisfaction.

“Hold up your right hand.”

I dropped my spoon and limply raised my hand, wondering how long I had to allow this. We’d intentionally taken a table at the back of the restaurant, but that had meant parading through the whole room.

“No, fingers together. Open your hand hard!”

Yes, like a protest, I thought. Enough!, I silently gestured at him. Stop! But he didn’t read my mind or body language. He was going to read my palm and I gave him the pose he wanted.

“I can see right away that you don’t like spending money. Your lifeline is long, but your loveline is broken. You’ve had multiple relationships, yes? Or you will.” He stretched to pour me some wine. “I think you like the lifestyle…?”

I gave away nothing with my stoneface. I felt mean and I wasn’t going to let him cold-read me. I took a spoonful of broth, noticing a faint essence of orange peel.

“No, I’m not finished! Hand up!”

I put my hand up obediently and tuned out as the man droned on. My anger brewed and my tolerance withered. We’re often interrupted at meals, but most people are polite enough to keep it brief. And how many simply forego interrupting our meal at all?

“isn’t he wonderful?” the wife was saying. “Is he right? Isn’t he exactly right?”

“You’ve said a lot,” I offered, “and it was remarkable. I’ll have my dinner now, before it gets cold.” I wished for once that Bob would tone down his manners. He was too gracious about the intrusion. As always just after a show, he was high on endorphins, talkative. I was the only sourpuss.

I imagined the accidents that could occur with shellfish in broth. How well could I aim a recalcitrant mussel shell? I’ve splashed myself enough times to know how to orchestrate a brothy geyser. Or, the crab claw—might it squirt when I straighten the joint? Amusing myself this way made me feel a little better. What the hell, we were in it. Can’t change the situation now.

“This is only the second time he’s read someone’s hand,” the wife said. “Really, he doesn’t do it all the time. I don’t know what made him do it. It’s hot in here, isn’t it? Are you hot?” She waved her hand in front of her neck, then lifted her silver necklace, as if it to let air under it, or to dislodge it from sweaty skin.

Swinger necklace

And of course, calling attention to her delicate chain made me notice the oddness of its four silver charms. They were two identical male gender symbols, and two identical female symbols.

Bob and I worked on our soup while the couple egged each other on with their stories. I guzzled the Chardonnay, thinking another bottle would be fair compensation.

The couple was not particularly obnoxious. The man, Sheldon, had certainly behaved badly when he imposed himself and then his wife. He didn’t notice (or ignored) my discomfort when he insisted on reading my hand. So he had poor judgment. Or was a little drunk. A life-of-the-party type, he’s probably accustomed to spicing up dull conversations. Full of himself, though, he failed to pick up our signals.

Maybe we failed to pick up his, too. Was this some sort of pitch or come-on? Did we miss some subtle clues embedded in Edward’s hand-reading blather? Maybe I should have paid attention.

Bob and I excused ourselves before dessert, preempting the invitation I now think would have been inevitable. But we’ll never know what Phyll and Shelly were plotting or what activities they had in mind.

I often struggle with the choice between courtesy and honesty. I’d like to practice both, but sometimes the two are mutually exclusive. In this situation, I was neither. And I hated it. Honesty was not called for, but I should have been able to dredge up some grace, if not courtesy.
© Copyright 2008-2010 Bambi Vincent. All rights reserved.

Bob Arno on “Lie to me”

Two pickpockets looking for a victim.
Two pickpockets looking for a victim.

I watched the first two episodes of Fox Network’s new television program Lie to Me, whose main character is loosely based on Paul Ekman, the world’s foremost expert on facial micro-expressions and how to spot when someone is lying. This is an intriguing, new subject to the majority of us. Call it a sexy science. Who wouldn’t like to immediately realize when his mate or partner is fibbing or deceiving him? And wouldn’t we like to ask our financial advisors: “have you ever swindled or cheated any of your previous customers?”

The bad guys, too, want to know how to manipulate their expressions when asked “where were you on the night of April 18?” Will this program suddenly shed light on surveillance and interrogation techniques that have previously been shrouded in mystery? It’s said that Paul Ekman is or has been working for the NSA. It’s confirmed that he’s involved in the structure of a limited program for TSA, in which screeners are supposed to detect irrational behavior in passengers that could indicate terrorist activity, signaling the need for additional and deeper screening of their luggage.

Dr. Ekman has spent a lifetime studying micro-expressions. What’s the chance Continue reading

Bob Arno on redflagging as criminal profiling

An eye.
An eye.

[Finally, a few words from Bob Arno.]

As we travel the world every year, we interact with organized crime figures, street criminals, and security personnel along the way, observing and absorbing the latest trends in criminal behavior and the latest techniques. Over the past twenty years, I have maintained dialogs and communications with some rather interesting criminal minds on four continents. But talking about security issues and criminal behavior, on the internet or to media in general, is always a dilemma. Yes, it’s useful to reveal the latest scoop about the rogue fringe of society, but by bringing revelations into the open we might tip our hand to the bad guys.

Striking up conversations with criminals usually means we first have to detect them, identify them, and somehow confirm that they really are thieves—unless we have direct cooperation from law enforcement agencies. We’ve developed unique skills in detecting criminal behavior and patterns that we recognize before the crimes take place. Modern crime prevention is often based on similar methods and techniques, and written into algorithms for computer analysis. Yes, they are obviously very different depending on the country where the criminals are active, the type of crimes anticipated, and other cultural factors. In security circles, a common word for this analytical activity is “redflagging.”

Bambi Vincent, Kevin Mitnick, and Bob Arno.
Bambi Vincent, Kevin Mitnick, and Bob Arno.

The kick-in-the-pants for this post came from an incident we became privy to in Atlanta last week, while there to address the ASIS annual conference—the world’s largest security convention. Kevin Mitnick, the famous (or infamous) former hacker—is there such a thing as former hacker?—was also there, as a presenter and panel host on Internet abuses. Kevin, always full of new anecdotes and intriguing …˜backend’ stories, is an old friend of ours. It was his exhaustive airport encounter earlier that day (with ICE, US customs, and the FBI) that got me thinking about redflagging, which is what entangled Kevin.

In the past few weeks, two books have been published which both indirectly focus on redflagging, how to isolate a certain behavior from the norm, and then to draw conclusions. This is not exactly science, but reasonable speculation. Behavior is an extension of human emotion; it’s difficult to completely suppress our emotions, and therefore our behavior.

The new books are The War Within: Secret White House, by Bob Woodward, and The Numerati, by Stephen Becker. Both books allude to new and secret formulas used by the U.S. government as well as the private sector, to fight terrorism and crime in general. Woodward’s book speculates about isolating terrorist leaders and taking them out with precise weapons. In his blog, Schneier on Security, Bruce Schneier wagers that Woodward is talking about “tagging.” The speculation centers around new technologies, but we can be quite certain that some algorithms on behavior are reasons for the new successes in the war on terrorism.

Lips
Lips

The other book, The Numerati, is not about politics or security developments. It’s about the latest trends in analyzing emerging patterns by drilling through data banks. A good review, “Drilling Through Data,” can be read in The Wall Street Journal, and there’s an interview with the author on NPR. The book discusses security software analytics. The last part of the book covers irregular pattern recognition and Jeff Jonas’ work in the casino industry. A good introduction to the world of Jeff Jonas and his contribution to the security industry is posted in O’Reilly’s Etech Conference pages from March 2008. Jeff Jonas works for IBM (and we assume for divisions of our National Security Agency, in some capacity or another). To get the gist of his talk on casino scams and how to detect crime in casinos using surveillance technology coupled with databases of known criminals, you have to drill further. This is very good reading for those with an interest in irregular pattern recognition.

Neither book sheds any precise information on what we want to know most: what are the security agencies concentrating on when they assemble their “trip wires” for redflagging? And that’s good; why should we let the other side know how they’re spotted?

Forehead
Forehead

In its most simplistic application, analytics are used in surveillance software in the retail and hospitality industries, and in public places. For example, the scanning of individuals hovering or loitering around an entrance or in a hotel lobby; the number of seconds a cash register’s drawer stays open in a store; how the hands of the employee at that cash register move; the angle of the hand holding the credit card (think portable skimmers).

All of which is just foreplay to the real issue: the behavior of terrorists. What speed or pace and how do they walk when approaching a target? How does a female terrorist behave differently from a male? How do they behave when stopped or challenged? And most important, what about their face reactions? Can a telephoto video scanner pick up micro-expressions and can the latest research by people like Dr. Paul Ekman and Mark Frank map these movements with accuracy?

Fake smile.
Fake smile.

For some interesting current examples of micro-expressions, watch again the recent Sarah Palin interview on ABC Evening News with Charles Gibson.   The moments for interpretation come at three minutes and 59 seconds, when Charles Gibson asks her if she has ever met with foreign heads of states. More of the same expressions when Gibson asks whether Russia was provoked to go into Georgia, five minutes and 13 seconds into the interview. And finally, at eight minutes and 34 seconds, at the question about the Bush Doctrine. Whether the clenching, lip protrusion, closing of eyes, and swaying can be interpreted as precise proof of one thing or another is up to the students of Paul Ekman.

Redflagging as a form of profiling is controversial. My points above illustrate how complex and far-reaching the conclusions may be to our society. I have not even touched on the privacy angle, the national security aspects, and what the bad guys can do to counteract the revelations made by media on the latest security innovations. Ultimately it comes down to the old argument: what do we keep secret (for national security) and what do we allow the public to know in order to protect privacy and maintain open political dialogs?

My objective today is to draw attention to the constant need to fine-tune information analytics. It is the lack of qualified experts drawing useful conclusions, which has triggered all kinds of recent mishaps, near financial ruin, and security lapses. This article is not meant to start new political discussions on security secrecy or privacy protection. Others who specialize in advancing and protecting both viewpoints are far more qualified.

[The facial features above belong to confirmed criminals, photographed during interrogation.]